πββοΈ Decode and analyze protobuf efficiently.
β138Oct 2, 2024Updated last year
Alternatives and similar repositories for ProtoDeep
Users that are interested in ProtoDeep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blackbox Protobuf is a set of tools for working with encoded Protocol Buffers (protobuf) without the matching protobuf definition.β712Feb 5, 2026Updated 2 months ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and β¦β16Apr 9, 2026Updated last week
- Module(s) related to reading SEGB (fka "Biome") data from iOS, mascOS, etc.β29Sep 9, 2025Updated 7 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β14Jul 22, 2024Updated last year
- β20Jul 19, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- β83May 9, 2024Updated last year
- Queries to use on the store.cloudphotodb database. Provides you with iCloud Photos Sync directions and other informationβ12Sep 4, 2023Updated 2 years ago
- Windows Forensics Salt Statesβ22Updated this week
- Tools used for Pentestingβ22Apr 21, 2023Updated 2 years ago
- β26Dec 31, 2025Updated 3 months ago
- Maltego Transform Partner to Ghuntβ16Jan 10, 2025Updated last year
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filtersβ112Jun 23, 2025Updated 9 months ago
- SALSA πβ‘ - SALesforce Scanner for Aura (and beyond). Enumeration of vulnerabilities and misconfigurations against Salesforce endpoint.β29Jan 26, 2025Updated last year
- A swiss army knife for pentesting networksβ24Mar 16, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter namesβ39May 5, 2024Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectorsβ14May 21, 2024Updated last year
- Create and publish PiRogue imagesβ25May 3, 2025Updated 11 months ago
- mift - a mobile image forensic toolkitβ47Nov 14, 2023Updated 2 years ago
- A simple Google Protobuf Decoder for Burpβ43Nov 22, 2022Updated 3 years ago
- An OSINT tool that permit to obtain the username of an Github account by simply specifying a mail adress, even is the mail is set in privβ¦β11Aug 10, 2023Updated 2 years ago
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new oneβ¦β13Dec 18, 2016Updated 9 years ago
- Gain insight into any Linux command or application with no code modificationβ39Nov 20, 2024Updated last year
- My ctf challenges, mostly cryptographyβ15Jul 13, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Signatures for wraith used to detect secrets across various sourcesβ15Jul 8, 2022Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.β97Jan 2, 2025Updated last year
- This is a new repository used to provide updated SQLite queries for both Photos.sqlite databases. Most of the updated queries will work oβ¦β13Mar 29, 2024Updated 2 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.β227Jul 24, 2025Updated 8 months ago
- Easy discovery of assetsβ13Jun 22, 2022Updated 3 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response maβ¦β81Oct 20, 2023Updated 2 years ago
- β17Apr 27, 2023Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.β24Oct 4, 2021Updated 4 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The cβ¦β17Mar 30, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.β18Apr 30, 2025Updated 11 months ago
- Tool for enumerating Active Directory environmentsβ48Aug 10, 2023Updated 2 years ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.β27Mar 17, 2024Updated 2 years ago
- Custom rules by cycloneβ16Dec 12, 2025Updated 4 months ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].β14Nov 26, 2025Updated 4 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resourcesβ148Dec 9, 2024Updated last year
- β27Jan 16, 2026Updated 3 months ago